General

Last Updated on 13 April 2015, Total: 160 Blog Posts

  1. Windows 7 and Windows 8 Security Guidelines

    The Windows 8 Secure Boot process alerts a user when an attempt to subvert the security controls has taken place. It is important that users know how to identify and respond to this alert... Read More

  2. Can we learn from SCADA security incidents?

    Industrial Control Systems look more and more like consumer PCs. They are used everywhere and involve a considerable amount of software... Read More

  3. Operation DeputyDog Analysis

    Operation DeputyDog campaign leveraged a zero-day vulnerability in Microsoft Internet Explorer... Read More

  4. Routers default passwords online database

    RouterPasswords.com provides quick access for technicians to default passwords used on routers, default web logins, CCTV systems and other electronic devices... Read More

  5. API vulnerability in PayPal

    The Vulnerability Laboratory Research Team discovered a filter bypass & persistent web vulnerability in the official PayPal Inc Core Application API... Read More

  6. Obtaining remote root shell on a SOHO router

    This paper details the various strategies Zach pursued in search of an exploitable 0-day... Read More

  7. Mining for New C&C Domains

    Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates... Read More

  8. September Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com August monthly newsletters... Read More

  9. Authentication Vulnerability in Microsoft Yammer Social Network

    Yammer is a secure, private social network for private communication within organizations or between organizational members and pre-designated groups... Read More

  10. Webinar - Unlocking IT with Big Data

    HP Software Web Event - Driving the New Style of IT... Read More

Featured Links